Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2024, 10:34

General

  • Target

    5b7a6743d414205cf4f6972bdba2aa594f975b5779e0a3070b50ef7553cd3567N.exe

  • Size

    236KB

  • MD5

    33b77a0a127c49adc41ad49fdbb7fe90

  • SHA1

    df803a4daef7efabe83f2995683eee443ce09081

  • SHA256

    5b7a6743d414205cf4f6972bdba2aa594f975b5779e0a3070b50ef7553cd3567

  • SHA512

    6dff61035835f70976716df66db26f9903288d4a2889c8d33d82943c4e5e9d4724f2c6304e492c24785a9cb75dffd4db7258773739a7a0403d58ccd2ff021764

  • SSDEEP

    3072:OJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/aH/FnncroP9:SwDeM7iNEkgiOb31k1ECyfJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b7a6743d414205cf4f6972bdba2aa594f975b5779e0a3070b50ef7553cd3567N.exe
    "C:\Users\Admin\AppData\Local\Temp\5b7a6743d414205cf4f6972bdba2aa594f975b5779e0a3070b50ef7553cd3567N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2180

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-Wt8RELntgBRt0LRp.exe

          Filesize

          236KB

          MD5

          55ece7a173f5ba274645db70b64da2f3

          SHA1

          78f7aed3fc2587a3b8999324c5cdac64045b48fb

          SHA256

          ba5483a402cdb19e5f552879c233999960031cba8a9bd02f72606d1b685d5b05

          SHA512

          059e4e9a8cb6591bdc9072f7e44affed599fd4c6a01e814e9620e3a9deaffe5ebcff6afd98ca9bac89457953ceac177a9c2d9a8904bc576807a68bbf7c1f4412

        • memory/2180-0-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/2180-1-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB